|
Kali Passwords 3
|
Kali Attack |
25 |
|
|
Kali Passwords 1
|
Kali Attack |
25 |
|
|
2:30pm Challenge Drop
|
Challenge Drop |
5 |
|
|
Write Your Own Path
|
Kali Student |
15 |
|
|
Too Powerful
|
Kali Student |
15 |
|
|
2pm Challenge Drop
|
Challenge Drop |
15 |
|
|
DES(DES(DES(x)))
|
Cryptography |
25 |
|
|
Silent Control 4
|
Networking |
25 |
|
|
Silent Control 3
|
Networking |
30 |
|
|
The Oracle's Prediction
|
Steganography |
20 |
|
|
Uninvited Query 4
|
Networking |
20 |
|
|
Traceroute 3
|
Networking |
15 |
|
|
Uninvited Query 3
|
Networking |
20 |
|
|
Silent Control 2
|
Networking |
10 |
|
|
Silent Control 1
|
Networking |
10 |
|
|
Uninvited Query 2
|
Networking |
10 |
|
|
Traceroute 2
|
Networking |
10 |
|
|
Cracked 4
|
Networking |
25 |
|
|
Cracked 3
|
Networking |
10 |
|
|
Cracked 2
|
Networking |
30 |
|
|
Cracked 1
|
Networking |
15 |
|
|
Don't Tell Me
|
Win7 |
10 |
|
|
Uninvited Query 1
|
Networking |
15 |
|
|
Traceroute 1
|
Networking |
5 |
|
|
Cronic Execution 1
|
Kali Student |
15 |
|
|
Hashbrowns 2
|
Cryptography |
10 |
|
|
Group Me
|
Kali Student |
10 |
|
|
Lockpick 1
|
Physical Challenge |
5 |
|
|
Micro:bit 2
|
Physical Challenge |
5 |
|
|
Micro:bit 1
|
Physical Challenge |
5 |
|
|
Shift 2
|
Physical Challenge |
5 |
|
|
Explore the Data 2
|
OSINT |
10 |
|
|
Explore the Data 1
|
OSINT |
10 |
|
|
Layered Security Approach
|
Cryptography |
15 |
|
|
Port Authority 2
|
OSINT |
10 |
|
|
What a word
|
Misc |
5 |
|
|
Port Authority 1
|
OSINT |
10 |
|
|
Hypertext 2
|
Misc |
5 |
|
|
Fools Flag
|
Misc |
50 |
|
|
Shift 1
|
Physical Challenge |
5 |
|
|
Branding (or no branding?)
|
Physical Challenge |
20 |
|
|
Gain Access
|
|
0 |
|